Professional Documents
Culture Documents
GreenWich
CONTENTS
DESCRIPTION
PAGENO
ABSTRACT
INTRODUCTION
ORGANIZATION PROFILE
MODULE DESCRIPTION
TECHNOLOGY
DATAFLOW DIAGRAMS
SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS
OVERVIEW OF .NET TECHNOLOGY
OUTPUTS
CONCLUSION
BIBLIOGRAPHY
-1-
PROJECT REPORT
GreenWich
ABSTRACT
Advances in technology and the growth of Integrated Collage Management System to
provide educators and trainers with unique opportunities to enhance learning and
teaching in corporate, government, healthcare, and higher education. This application
serves as a forum to facilitate the exchange of information on the current research,
development, and practice of Integrated Collage Management System in the sectors.
It includes the research, development, and practice of Integrated Collage
Management System related to the following multi-dimensional topics and sub-topics.
GreenWich comes in different configurations that dictate the depth of a needs
assessment. The simple Integrated Collage Management System implementations,
such as those following an application service provider (ASP) model, won't
necessarily look any different from a resource requirement perspective than traditional
classroom training. That's GreenWich.
GreenWich can be an enormous undertaking and, require significantly more
preparation due to its increased scope, higher interdependence, and visibility. These
factors--described below--are the reason a needs assessment for an Integrated
Collage Management System initiative looks different from one for a traditional
classroom program.
-2-
PROJECT REPORT
GreenWich
INTRODUCTION
In order for a needs assessment to have a successful outcome, it must accomplish
many things--improving performance being just one. It must also
-3-
PROJECT REPORT
GreenWich
-4-
PROJECT REPORT
GreenWich
-5-
PROJECT REPORT
GreenWich
MODULES
Administration
User Management
Content Management
Evaluation
MODULE DESCRIPTION
Administration:
Working options
o Caching Feature
o Content length for each Category
User Management:
User Information
Content Management:
-6-
PROJECT REPORT
GreenWich
These are the pages that are associated with the logic pages, and
contain content specific to that page.
Evaluation
TECHNOLOGY
Technology Used:
.Net
IIS
Oracle
Operating System:
o Windows
PROJECT REPORT
GreenWich
emphasis on the logic underlying the system, by using combination of only 4 symbols.
It follows a top down approach. A full description of a system actually consists of set
of DFD s , which comprises of various levels. And initial over view model is exploded
lower level diagrams that show additional feature of the system. Further each process
can be broken down into a more detailed DFD. This occurs repeatedly until sufficient
details is described.
DFD symbols
square
Circle or Bubble
It represents a process that transforms incoming data flow(s) into outgoing data
flow(s).
-8-
PROJECT REPORT
GreenWich
Open Rectangle
-9-
PROJECT REPORT
GreenWich
GANE
AND
DATA FLOW
DATA STRUCTURE
EXTERNAL ENTITY
OR
DATA LINK
PROCESS
- 10 -
SARSON NOTATION
PROJECT REPORT
GreenWich
DATA BASE
DATA FLOW
DATA STRUCTURE
EXTERNAL ENTITY
OR
DATA LINK
PROCESS
- 11 -
PROJECT REPORT
GreenWich
DATA BASE
- 12 -
PROJECT REPORT
GreenWich
- 13 -
PROJECT REPORT
GreenWich
E R DIAGRAMS.
- 14 -
PROJECT REPORT
GreenWich
- 15 -
PROJECT REPORT
GreenWich
- 16 -
PROJECT REPORT
GreenWich
UML ANALYSIS
- 17 -
PROJECT REPORT
GreenWich
Courses
Course
Reg
New course
Examination
Staff
appointment
Student
Content mgmt
Registration
Administrator
Staff Details
Qestions
- 18 -
PROJECT REPORT
GreenWich
Sequence Diagram
Admin
Student
Courses
Students Session
Modification of
Courses
Cancellation of
Courses / Staff
Register a Course ()
Accepted / Rejected the
Registration of Course()
Request for Staff ( )
Result evaluations of
`
Updating on Courses
- 19 -
the
Student
Staff
PROJECT REPORT
GreenWich
GUI Component
Menu
Report
Options
<<instantiates>>
Data Store
Input Screen
Greenwich
<<uses>>
User_Sub
User_Main
students
Stafff
Data Manipulator
Student det
Staff det
Course det
evaluation
- 20 -
Questions
Content dev
Discussions
PROJECT REPORT
GreenWich
Validate
- 21 -
Specify user/Admin
PROJECT REPORT
GreenWich
DATA DICTIONARY.
Database Design:
T_Admin
T_CourseReg
T_Courses
T_Emp_Personal
- 22 -
PROJECT REPORT
GreenWich
Staff_Master
- 23 -
PROJECT REPORT
GreenWich
500MHZ or above
128MB RAM
100MB Free Hard disk space
STD Color Monitor
Network interface card or Modem (For Remote Access)
LAN Network (For Remote Aources)
SOFTWARE REQUIREMENTS:
WINDOWS NT 4 | 2000 | 9.X | ME
Visual Studio .Net 2002 Enterprise Edition
Visual Studio .Net Framework (Minimal for Deployment)
- 24 -
PROJECT REPORT
GreenWich
In most cases, you do not need to reconfigure the server. The default settings
for the server components, configured during SQL Server Setup, allow you to
run SQL Server immediately after it is installed. However, server management
is necessary in those situations where you want to add new servers, set up
special server configurations, change the network connections, or set server
configuration options to improve SQL Server performance.
Creating a Database
To create a database determine the name of the database, its owner (the user
who creates the database), its size, and the files and filegroups used to store
it.
Before creating a database, consider that:
- 25 -
PROJECT REPORT
GreenWich
The user who creates the database becomes the owner of the database.
The name of the database must follow the rules for identifiers.
Primary files
These files contain the startup information for the database. The
primary files are also used to store data. Every database has one
primary file.
Secondary files
These files hold all the data that does not fit in the primary data file.
Databases do not need secondary data files if the primary file is large
enough to hold all the data in the database. Some databases may be
large enough to need multiple secondary data files, or they may use
secondary files on separate disk drives to spread the data across
multiple disks.
Transaction log
- 26 -
PROJECT REPORT
GreenWich
These files hold the log information used to recover the database. There
must be at least one transaction log file for each database, although
there may be more than one. The minimum size for a log file is 512
kilobytes (KB).
When a database is created, all the files that comprise the database are filled
with zeros to overwrite any existing data left on the disk by previously deleted
files. Although this means that the files take longer to create, this action
prevents the operating system from having to fill the files with zeros when
data is written to the files for the first time during usual database operations.
This improves the performance of day-to-day operations.
1. Expand a server group, and then expand the server in which to create a database.
2.
3.
4.
5.
- 27 -
PROJECT REPORT
GreenWich
After you have designed the database , the tables that will store the data in
the database can be created. The data is usually stored in permanent tables.
Tables are stored in the database files until they are deleted and are available
to any user who has the appropriate permissions.
Temporary Tables
You can also create temporary tables. Temporary tables are similar to
permanent tables, except temporary tables are stored in tempdb and are
deleted automatically when no longer in use.
The two types of temporary tables, local and global, differ from each other in
their names, their visibility, and their availability. Local temporary tables
have a single number sign (#) as the first character of their names; they are
visible only to the current connection for the user; and they are deleted when
the user disconnects from instances of Microsoft SQL Server 2000. Global
temporary tables have two number signs (##) as the first characters of their
names; they are visible to any user after they are created; and they are
deleted when all users referencing the table disconnect from SQL Server.
For example, if you create a table named employees, the table can be used
by any person who has the security permissions in the database to use it,
until the table is deleted. If you create a local temporary table named
#employees, you are the only person who can work with the table, and it is
deleted when you disconnect. If you create a global temporary table named
##employees, any user in the database can work with this table. If no other
- 28 -
PROJECT REPORT
GreenWich
user works with this table after you create it, the table is deleted when you
disconnect. If another user works with the table after you create it, SQL
Server deletes it when both of you disconnect.
Table Properties
You can define up to 1,024 columns per table. Table and column names must
follow the rules for identifiers; they must be unique within a given table, but
you can use the same column name in different tables in the same database.
You must also define a data type for each column.
Although table names must be unique for each owner within a database, you
can create multiple tables with the same name if you specify different owners
for each. You can create two tables named employees and designate Jonah
as the owner of one and Sally as the owner of the other. When you need to
work with one of the employees tables, you can distinguish between the two
tables by specifying the owner with the name of the table.
The
above
task
can
be
achieved
by
using
the
component
- 29 -
PROJECT REPORT
GreenWich
- 30 -
PROJECT REPORT
GreenWich
SELECTED SOFTWARE
Microsoft.NET Framework
The .NET Framework is a new computing platform that simplifies
application development in the highly distributed environment of the
- 31 -
PROJECT REPORT
GreenWich
The .NET Framework has two main components: the common language
runtime and the .NET Framework class library. The common language
runtime is the foundation of the .NET Framework. You can think of the
- 32 -
PROJECT REPORT
GreenWich
- 33 -
PROJECT REPORT
GreenWich
Framework not only provides several runtime hosts, but also supports
the development of third-party runtime hosts.
For example, ASP.NET hosts the runtime to provide a scalable, serverside environment for managed code. ASP.NET works directly with the
runtime to enable Web Forms applications and XML Web services, both
of which are discussed later in this topic.
Internet Explorer is an example of an unmanaged application that hosts
the runtime (in the form of a MIME type extension). Using Internet
Explorer to host the runtime enables you to embed managed
components or Windows Forms controls in HTML documents. Hosting
the runtime in this way makes managed mobile code (similar to
Microsoft
ActiveX
controls)
possible,
but
with
significant
- 34 -
PROJECT REPORT
GreenWich
overall system. The illustration also shows how managed code operates
within a larger architecture.
PROJECT REPORT
GreenWich
screen or sing a song, but cannot access their personal data, file
system, or network. The security features of the runtime thus enable
legitimate Internet-deployed software to be exceptionally feature rich.
The runtime also enforces code robustness by implementing a strict
type- and code-verification infrastructure called the common type
system (CTS). The CTS ensures that all managed code is selfdescribing. The various Microsoft and third-party language compilers
generate managed code that conforms to the CTS. This means that
managed code can consume other managed types and instances, while
strictly enforcing type fidelity and type safety.
In addition, the managed environment of the runtime eliminates many
common software issues. For example, the runtime automatically
handles object layout and manages references to objects, releasing them
when they are no longer being used. This automatic memory
- 36 -
PROJECT REPORT
GreenWich
- 37 -
PROJECT REPORT
GreenWich
- 38 -
PROJECT REPORT
GreenWich
can derive functionality. This not only makes the .NET Framework types
easy to use, but also reduces the time associated with learning new
features of the .NET Framework. In addition, third-party components
can integrate seamlessly with classes in the .NET Framework.
For example, the .NET Framework collection classes implement a set of
interfaces that you can use to develop your own collection classes. Your
collection classes will blend seamlessly with the classes in the .NET
Framework.
As you would expect from an object-oriented class library, the .NET
Framework types enable you to accomplish a range of common
programming tasks, including tasks such as string management, data
collection, database connectivity, and file access. In addition to these
common tasks, the class library includes types that support a variety of
specialized development scenarios. For example, you can use the .NET
Framework to develop the following types of applications and services:
Console applications.
- 39 -
PROJECT REPORT
GreenWich
ASP.NET applications.
Windows services.
- 40 -
PROJECT REPORT
GreenWich
likely access local resources such as the file system and peripherals
such as printers.
Another kind of client application is the traditional ActiveX control (now
replaced by the managed Windows Forms control) deployed over the
Internet as a Web page. This application is much like other client
applications: it is executed natively, has access to local resources, and
includes graphical elements.
- 41 -
PROJECT REPORT
GreenWich
PROJECT REPORT
GreenWich
- 43 -
PROJECT REPORT
GreenWich
- 44 -
PROJECT REPORT
GreenWich
(such as GUI elements and limited file access) without being able to
access or compromise other resources. Because of code access security,
many applications that once needed to be installed on a user's system
can now be safely deployed through the Web. Your applications can
implement the features of a local application while being deployed like a
Web page.
- 45 -
PROJECT REPORT
GreenWich
PROJECT REPORT
GreenWich
- 47 -
PROJECT REPORT
GreenWich
If you develop and publish your own XML Web service, the .NET
Framework provides a set of classes that conform to all the underlying
communication standards, such as SOAP, WSDL, and XML. Using those
classes enables you to focus on the logic of your service, without
concerning yourself with the communications infrastructure required
by distributed software development.
Finally, like Web Forms pages in the managed environment, your XML
Web service will run with the speed of native machine language using
the scalable communication of IIS.
SCREENS
- 48 -
PROJECT REPORT
GreenWich
- 49 -
PROJECT REPORT
GreenWich
- 50 -
PROJECT REPORT
GreenWich
- 51 -
PROJECT REPORT
GreenWich
- 52 -
PROJECT REPORT
GreenWich
- 53 -
PROJECT REPORT
GreenWich
- 54 -
PROJECT REPORT
GreenWich
- 55 -
PROJECT REPORT
GreenWich
- 56 -
PROJECT REPORT
GreenWich
- 57 -
PROJECT REPORT
GreenWich
- 58 -
PROJECT REPORT
GreenWich
- 59 -
PROJECT REPORT
GreenWich
- 60 -
PROJECT REPORT
GreenWich
- 61 -
PROJECT REPORT
GreenWich
- 62 -
PROJECT REPORT
GreenWich
PROJECT TESTING
1) COMPILATION TEST:
It was a good idea to do our stress testing early on, because it gave
us time to fix some of the unexpected deadlocks and stability
- 63 -
PROJECT REPORT
GreenWich
2) EXECUTION TEST:
3) OUTPUT TEST:
- 64 -
PROJECT REPORT
GreenWich
CONCLUSION
BIBLIOGRAPHY
- 65 -
PROJECT REPORT
GreenWich
SOFTWARE ENGINEERING
By Mr.HariNath
Professional ASP.NET 1.1
By Wrox
MSDN 2002
By Microsoft
- 66 -